Dave Gruber

Dave Gruber

Recent Posts by Dave Gruber:

Infographic: Managing the Endpoint Vulnerability Gap

Abstract:

Requirements from widespread work-from-anywhere policies have escalated the need for endpoint management and security convergence. IT and security teams require new mechanisms capable of providing common visibility, assessment, mitigation of software and configuration vulnerabilities, threat prevention, and support for threat investigation and response activities.

Learn more about these trends with the infographic, Managing the Endpoint Vulnerability Gap.

Topics: Cybersecurity

Research Report: Managing the Endpoint Vulnerability Gap

Research Objectives

Requirements from widespread work-from-anywhere policies have escalated the need for endpoint management and security convergence. IT and security teams need broad management, prevention, detection, and response capabilities that span endpoint devices and operating environments that are often outside of their control, which is driving many to desire convergence between management and security capabilities to simplify implementation, ongoing management, and risk mitigation.

Topics: Cybersecurity End User Computing

Complete Survey Results: Managed Detection and Response Trends

Research Objectives

  • Determine how, where, and why MDR services are used to support security programs.
  • Isolate specific MDR use cases, and the organizational profiles of those businesses that require them.
  • Understand what technology is expected from MDR and how organizations want to work together with MDR providers.
  • Establish if and what industry megatrends are impacting MDR provider selection.

Topics: Cybersecurity

Infographic: What Security Teams Want from MDR Providers

Abstract:

IT organizations shouldn’t be fooled by the name: Managed detection and response (MDR) providers are delivering much more than basic detection and response. With no end in sight for the cybersecurity skills shortage, MDR services can bring immediate expert resources online to help security teams gain control and set themselves up for future security program success. TechTarget’s Enterprise Strategy Group recently surveyed cybersecurity professionals in order to better understand these trends.

Learn more about these trends with the infographic, What Security Teams Want from MDR Providers.

Topics: Cybersecurity

Complete Survey Results: Managing the Endpoint Vulnerability Gap

Research Objectives

Identify challenges, strategies, and trends in endpoint management and security.
Determine if and how endpoint management and security functions and systems are converging.
Highlight opportunities for improving endpoint management and security fueled by functional convergence.

Topics: End User Computing Unified Communications

Research Report: What Security Teams Want from MDR Providers

Research Objectives

The use of managed detection and response services has become a mainstream strategy in modern security programs. But IT organizations shouldn’t be fooled by the name: MDR providers are delivering much more than basic detection and response, helping IT and security leaders accelerate program development and improve security posture. With no end in sight for the cybersecurity skills shortage, MDR services can bring immediate expert resources online, together with proven, best-of-breed processes and tools that can help security teams gain control and set themselves up for future security program success.

Topics: Cybersecurity

ESG Brief: The Demise of EDR?

Abstract:

As a top investment priority for security organizations, detection and response programs are entering a significant transition as attack surface expansion and threat complexity drive the need for more comprehensive visibility, detection, and response. The extended detection and response (XDR) movement has spawned a plethora of new solution offerings capable of detecting advanced threats by aggregating, correlating, and analyzing telemetry from endpoints, networks, the cloud, and identities together with a new level of more extensive threat intelligence. What impact – if any – do IT and cybersecurity teams anticipate XDR having on their current endpoint detection and response (EDR) solutions?

Topics: Cybersecurity XDR

ESG Brief: Microsoft Makes Gains in Endpoint Security

Abstract:

As expanding device diversity, zero trust, and extended detection and response initiatives drive organizations to reassess endpoint security solution investments, security teams are looking to replace existing tools with more capable, converged platforms. Significant advances in Microsoft's native endpoint security prevention, detection, and response capabilities, together with attractive bundling and pricing options, have propelled a meteoric rise in the popularity of Microsoft Defender for Endpoint over the past two years. While many intend to use Defender as a core component within their endpoint security arsenal, many still plan to supplement, potentially spawning a new opportunity for other security providers to deliver specialized add-on solutions.

Topics: Cybersecurity endpoint security

ESG Infographic: Endpoint Security Trends

Abstract:

To better secure their growing attack surface, IT and security teams are thinking differently about endpoint security platforms.

Topics: Cybersecurity

ESG Research Report: Security Megatrends and Their Impact on Endpoint Security

Abstract:

Cybersecurity megatrends, including zero trust, XDR, a pandemic-induced increase in remote workers, and the move to public cloud, are influencing the way organizations think about endpoint security. These megatrends add new requirements for endpoint security, while necessitating new levels of integration with other core security controls. Additionally, mobile and IoT are driving massive growth in the number and diversity of devices that must be protected. To better secure their growing attack surface, IT and security teams are thinking differently about endpoint security platforms, what they must include, and how they fit into the broader security stack.

Topics: Cybersecurity